Journal articles on the topic 'Australia Privacy Act 1988'

To see the other types of publications on this topic, follow the link: Australia Privacy Act 1988.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Australia Privacy Act 1988.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kemp, Katharine. "Strengthening Enforcement and Redress Under the Australian Privacy Act." Global Privacy Law Review 3, Issue 3 (September 1, 2022): 150–62. http://dx.doi.org/10.54648/gplr2022016.

Full text
Abstract:
The regulatory regime provided by the Privacy Act 1988 (Cth) has long been criticized for its limited effectiveness in providing both remedies for individuals and guidance and deterrence for entities obliged to comply with the statute. Key concerns include the restricted rights of redress for individuals, and the inadequate powers and funding of the federal privacy regulator, the Australian Information Commissioner. In the last three years, the Australian Competition & Consumer Commission (ACCC) has begun to take on an important role in advocating for reform of Australia’s privacy law, assessing the potential anticompetitive effects of the data practices of digital platforms, and actively litigating privacyrelated misleading conduct matters under the Australian Consumer Law (ACL). This article describes the contrast in the roles, powers and funding of these two regulators and makes proposals for reform which would assist in providing Australians with appropriate access to justice in directly redressing privacy wrongs beyond organizations’ misleading representations about data practices. Australia, Data Privacy, Privacy Regulators, Enforcement, Redress
APA, Harvard, Vancouver, ISO, and other styles
2

Manwaring, Kayleen. "Paradox or Pressure? Consumer Expectations and the Australian Privacy Act." Global Privacy Law Review 3, Issue 3 (September 1, 2022): 118–26. http://dx.doi.org/10.54648/gplr2022014.

Full text
Abstract:
This article outlines the empirical evidence in Australia regarding consumer privacy expectations as to commercial dealings with their data. Despite widespread disclosure of personal information from consumers to businesses, the evidence indicates that consumers believe that their privacy is important, and their personal information should be protected from misuse. However, this so-called ‘privacy paradox’, where consumer behaviour in ‘consenting’ to substantial data collection of personal information is not, in fact, a paradox. Rather, it is explained by consumers’ expectations and perceptions around data collection and handling by commercial entities: most importantly a perception by many that they have little or no choice or control over their personal information. It also shows that they expect the legal system to protect them against misuse of that data. With these expectations in mind, the article proceeds to introduce key parts of the general framework of the Privacy Act 1988 (Cth) under which digital data practices are currently regulated in Australia. Australia, Data Protection, Privacy, Consumers, Privacy Paradox
APA, Harvard, Vancouver, ISO, and other styles
3

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
4

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles-Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
5

Jackson, Margaret. "The effect of the proposed national data protection regime on the health sector in Australia." Australian Health Review 20, no. 1 (1997): 1. http://dx.doi.org/10.1071/ah970001.

Full text
Abstract:
The Commonwealth Government and a number of State governments are proposingto introduce legislation based on the Information Privacy Principles contained in thePrivacy Act 1988 (Cwlth). This will allow individuals access to any personalinformation held on them by any organisation or person, including privatepractitioners, private health facilities and State government agencies. This articlediscusses this proposed legislation and its implications for the health sector.Although in the public health area patients can already gain access to their medicalrecords through the use of the various Freedom of Information Acts and, in the caseof Commonwealth government agencies, the Privacy Act 1988 (Cwlth), the proposeddata protection legislation will provide more than access rights to individuals. Theeffect of the proposed legislation on the private sector, where no obligation exists onthe part of the doctor to grant a patient access to his or her records, will be substantial.
APA, Harvard, Vancouver, ISO, and other styles
6

Dawson, Sophie, and Emma Croft. "Missing (in) Action: Where Are the Australian Data Breach Class Actions?" Global Privacy Law Review 3, Issue 3 (September 1, 2022): 190–94. http://dx.doi.org/10.54648/gplr2022019.

Full text
Abstract:
Data breach class actions have been a feature of the privacy landscape in the US and UK since as early as 2002. While Australia has experienced a surge in regulatory actions brought in respect of data breaches, we have yet to see an uptick in consumer actions in Australia. An action was brought in 2018, however it settled prior to receiving judicial consideration. This article provides some examples of the difficulties of bringing such actions in Australia, both at a substantive and procedural law level. We also highlight some proposed upcoming legislative changes which may have an impact in this space, including the proposed introduction of a tort of privacy and direct right of action in respect of interferences with privacy under the Privacy Act 1988 (Cth) (Privacy Act). Privacy, Data, Breach, Cybersecurity, Australia, Litigation, Court, Class Action, Reform
APA, Harvard, Vancouver, ISO, and other styles
7

Bin Othman, Mohd Bahrin, and Muhammad Faiz Bin Abu Samah. "The Australian Privacy Act 1988: Lesson to Be Learned." Malaysian Journal of Social Sciences and Humanities (MJSSH) 7, no. 9 (September 30, 2022): e001766. http://dx.doi.org/10.47405/mjssh.v7i9.1766.

Full text
Abstract:
Privacy is a fundamental human right recognized either explicitly or implicitly all around the world constitution. However, these privacy rights are being eroded by advanced technologies. The efficiency of the Australian Privacy Act 1988 being a non-European Union state in governing the protection of personal data is remarkable. The purpose of this paper is to shed light on how the Australian Privacy Act 1988 can be used as a benchmark for the Malaysian Personal Data Protection Act 2010. Thus, this paper employs a doctrinal qualitative method to best explore the ideas and concepts within the literature available regarding the legislation for the protection of personal data. It suggests that there are improvements to be made for the Malaysian Personal Data Protection Act 2010 to be adequate.
APA, Harvard, Vancouver, ISO, and other styles
8

Manwaring, Kayleen. "‘Click Here to (Dis)agree’: Australian Law and Practice in Relation to Informed Consent." Global Privacy Law Review 3, Issue 3 (September 1, 2022): 127–49. http://dx.doi.org/10.54648/gplr2022015.

Full text
Abstract:
This article provides a detailed examination of issues with the legislative framework meeting consumer expectations in relation to informed consent, particularly in relation to the Privacy Act 1988 (Cth) and the Australian Consumer Law (ACL). It also discusses two potential areas that might assist in fleshing out the current minimalist legislative definition of consent: namely case law and guidelines issued by the Australian privacy regulator, the Office of the Australian Information Commissioner (the OAIC Guidelines). However the case law available in this area is sparse and provides little guidance. Additionally, the non-binding OAIC Guidelines, while referred to frequently in privacy determinations, appear to have little real effect in influencing the data practices of many firms. The article concludes that the current approach to regulating ‘consent’ has not provided adequate protections for consumers in light of extensive empirical evidence regarding consumer privacy preferences and attitudes regarding data practices. Australia, Data Protection, Privacy, Informed Consent
APA, Harvard, Vancouver, ISO, and other styles
9

Bomba, David, and George Hallit. "Will the new Australian Health Privacy Law provide adequate protection?" Australian Health Review 25, no. 3 (2002): 141. http://dx.doi.org/10.1071/ah020141a.

Full text
Abstract:
Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines(enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.
APA, Harvard, Vancouver, ISO, and other styles
10

Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.

Full text
Abstract:
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the United States Federal Trade Commission has been using its power under the United States consumer protection regime to regulate these problems. The Australian Competition and Consumer Commission (ACCC), on the other hand, has yet to bring civil or criminal proceedings for online privacy or data security breaches, which indicates a reluctance to employ the Australian Consumer Law (‘ACL’) in this field.1 Recent legislative action instead points to a greater application of the specifically targeted laws under the Privacy Act 1988 (Cth) (‘Privacy Act’), and the powers of the Office of the Australian Information Commissioner (OAIC), to protect consumer privacy and data security. This article contends that while specific legislation setting out, and publicly enforcing, businesses’ legal obligations with respect to online privacy and data protection is an appropriate regulatory response, the ACL's broad, general protections and public and/or private enforcement mechanisms also have a role to play in protecting consumer privacy and data security.
APA, Harvard, Vancouver, ISO, and other styles
11

Nicol, Dianne, Meredith Hagger, Nola Ries, and Johnathon Liddicoat. "Time to Get Serious about Privacy Policies: The Special Case of Genetic Privacy." Federal Law Review 42, no. 1 (March 2014): 1–32. http://dx.doi.org/10.22145/flr.42.1.7.

Full text
Abstract:
Genetic information is widely recognised as being particularly sensitive personal information about an individual and his or her family. This article presents an analysis of the privacy policies of Australian companies that were offering direct-to-consumer genetic testing services in 2012–13. The results of this analysis indicate that many of these companies do not comply with the Privacy Act 1988 (Cth), and will need to significantly reassess their privacy policies now that significant new amendments to the Act have come into force. Whilst the Privacy Commissioner has increased powers under the new amendments, the extent to which these will mitigate the deficiencies of the current regime in relation to privacy practices of direct–to-consumer genetic testing companies remains unclear. Accordingly, it may be argued that a privacy code for the direct-to-consumer genetic testing industry would provide clearer standards. Alternatively it may be time to rethink whether a sui generis approach to protecting genetic information is warranted.
APA, Harvard, Vancouver, ISO, and other styles
12

Yuvaraj, Joshua. "How about me? The scope of personal information under the Australian Privacy Act 1988." Computer Law & Security Review 34, no. 1 (February 2018): 47–66. http://dx.doi.org/10.1016/j.clsr.2017.05.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hayden, Jacqueline. "Available, Accessible, High Quality Child Care in Australia: Why we haven’t moved very far." Children Australia 17, no. 1 (1992): 10–15. http://dx.doi.org/10.1017/s1035077200030091.

Full text
Abstract:
In a recent article in Children Australia (16:2, 1991) Moore points out how our system of social services and community work reinforces traditional concepts of family (especially mother) responsibility for the care of children with disabilities. This same attitude reflects a fundamental ambivalence in our society towards the provision of state assisted child care. Like care for the disabled, out-of-home care for young children is assumed to rest within the private sphere, so that state assistance in any form becomes gratefully accepted as a generous gift.Child care in Australia moved into the political realm with the enactment of the Child Care Act in 1972. This legislation described the conditions under which the Commonwealth Government would distribute funds for capital expenses, and provide some wage supplements to non-profit groups delivering child care services in formal centre settings. Since that time, promises of increased Commonwealth funding to meet increasing demand have become more and more ambitious – 20,000 spaces were promised in 1984; 30,000 in 1988; and by 1990, the promise had expanded to 78,000 new child care spaces to be funded by the Labor Party. As it turned out, many of the 78,000 spaces promised during the 1990 election campaign were not ‘new’ at all, but represented already existing private spaces, now made eligible for funding by a change in policy. The bulk of the spaces meanwhile were targeted for after-school care (much less expensive to fund), when research clearly indicated the dearth of spaces and critical need for infant care (very expensive to fund).
APA, Harvard, Vancouver, ISO, and other styles
14

Shailer, Gabriella. "Limitations of personal information in an online environment." Alternative Law Journal 43, no. 4 (October 30, 2018): 309–12. http://dx.doi.org/10.1177/1037969x18789184.

Full text
Abstract:
This Brief will demonstrate the provisions of the Privacy Act 1988 (Cth) that govern the usage of personal information can create substantial risk to the individual. It will accomplish this by setting out how the provisions of the Privacy Act 1988 (Cth) would not have prevented the sharing of the fitness data sourced from corporate servers in January 2018. It will explain how that published information would be classified as ‘de-identified’ data under Privacy Act 1988 (Cth). It will conclude by describing how the collection and collation of the data could form a risk to the individual.
APA, Harvard, Vancouver, ISO, and other styles
15

van Geel, Mieke. "THE COMPUTER MATCHING AND PRIVACY ACT OF 1988." Tilburg Law Review 2, no. 1 (January 1, 1992): 41–48. http://dx.doi.org/10.1163/221125992x00034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bates, Frank. "New views of parenting." Children Australia 19, no. 4 (1994): 15–21. http://dx.doi.org/10.1017/s1035077200004193.

Full text
Abstract:
There is nothing more inscribed nor thought nor felt and this must comfort the heart’s core against Its false disasters - these fathers standing round. These mothers touching, speaking, being near. These lovers waiting In the soft dry grass. [Wallace Stevens. “Credences of Summer”!“I have come to regard the law courts not as a cathedral but rather as a casino”. [Richard Ingrams, former Editor of Private Eye.]Before entering into discussion of the substantive topic, it should be said that Australian Family Law is, in one sense at least, always new. It is without question one of the most scrutinised areas of Australian Law: the Family Law Act 1975 has been amended no less than thirty four times since its coming into force in February 1976, sometimes extensively; it has been the subject of two reports of Joint Select Committees of the Australian Parliament, in 1980 (Bates, 1980) and 1992 (below). In addition, its operation and administration is under continual scrutiny from two statutory bodies – the Family Law Council (Family Law Act 1975 s115) and the Australian Institute of Family Studies (Family Law Act 1975 Part XIVB).
APA, Harvard, Vancouver, ISO, and other styles
17

Wall, Patricia S. "Drug Testing In The Workplace: An Update." Journal of Applied Business Research (JABR) 8, no. 2 (October 18, 2011): 127. http://dx.doi.org/10.19030/jabr.v8i2.6175.

Full text
Abstract:
Drug testing is one of the most rapidly changing areas of employment law today. Although private employers are not bound by the same constitutional restrictions as public employers, they may still be sued on such grounds as invasion of privacy, defamation, and intentional infliction of emotional distress. Moreover, private employers holding federal contracts now must comply with both the Drug-Free Workplace Act of 1988 and the Drug-Free Work Force Act of 1988. This paper discusses some of the leading case and statutory law in the drug-testing area.
APA, Harvard, Vancouver, ISO, and other styles
18

Bentley-Cooper, Josephine E. "Protecting human research from an invasion of privacy: the unintended results of the Commonwealth Privacy Act 1988." Australian Journal of Public Health 15, no. 3 (February 12, 2010): 228–34. http://dx.doi.org/10.1111/j.1753-6405.1991.tb00338.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Evans, Barbara J. "Economic Regulation of Next-Generation Sequencing." Journal of Law, Medicine & Ethics 42, S1 (2014): 51–66. http://dx.doi.org/10.1111/jlme.12162.

Full text
Abstract:
The genetic testing industry is in a period of potentially major structural change driven by several factors. These include weaker patent protections after Association for Molecular Pathology v. Myriad Genetics (the “Myriad decision”) and Mayo Collaborative Services v. Prometheus Laboratories, Inc.; a continuing shift from single-gene tests to genome-scale sequencing; and a set of February 2014 amendments to the Clinical Laboratory Improvement Amendments of 1988 (CLIA) regulations and the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. This article explores the nature of these changes and why they strain existing regulatory frameworks for protecting patients, research subjects, and other consumers who receive genetic testing.Oversight of genetic testing has, at least to date, had two major thrusts: (1) privacy and ethical protections and (2) traditional consumer health and safety regulations. Examples of the first are the Genetic Information Nondiscrimination Act and the HIPAA Privacy Rule, which after 2013 amendments expressly protects genetic privacy as well as other medical privacy.
APA, Harvard, Vancouver, ISO, and other styles
20

Robiatul Adawiah, Laila, and Yeni Rachmawati. "Parenting Program to Protect Children's Privacy: The Phenomenon of Sharenting Children on social media." JPUD - Jurnal Pendidikan Usia Dini 15, no. 1 (April 30, 2021): 162–80. http://dx.doi.org/10.21009/jpud.151.09.

Full text
Abstract:
Sharenting is a habit of using social media to share content that disseminates pictures, videos, information, and parenting styles for their children. The purpose of this article is to describe the sharenting phenomenon that occurs among young parents, and the importance of parenting programs, rather than protecting children's privacy. Writing articles use a qualitative approach as a literature review method that utilizes various scientific articles describing the sharenting phenomenon in various countries. The findings show that sharenting behaviour can create the spread of children's identity openly on social media and tends not to protect children's privacy and even seems to exploit children. Apart from that, sharenting can also create pressure on the children themselves and can even have an impact on online crime. This article is expected to provide benefits to parents regarding the importance of maintaining attitudes and behaviour when sharing and maintaining children's privacy and rights on social media. Keywords: Sharenting on social media, Children's Privacy, Parenting Program References: Åberg, E., & Huvila, J. (2019). Hip children, good mothers – children’s clothing as capital investment? Young Consumers, 20(3), 153–166. https://doi.org/10.1108/YC-06-2018-00816 Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and child maltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27–38. https://doi.org/10.1016/j.psi.2015.10.003 Archer, C., & Kao, K.-T. (2018). Mother, baby, and Facebook makes three: Does social media provide social support for new mothers? Media International Australia, 168(1), 122–139. https://doi.org/10.1177/1329878X18783016 Bartholomew, M. K., Schoppe-Sullivan, S. J., Glassman, M., Kamp Dush, C. M., & Sullivan, J. M. (2012). New Parents’ Facebook Use at the Transition to Parenthood. Family Relations, 61(3), 455–469. https://doi.org/10.1111/j.1741-3729.2012.00708.x Belk, R. W. (1988). Possessions and the Extended Self. Journal of Consumer Research, 15(2), 139. https://doi.org/10.1086/209154 Belk, R. W. (2013). Extended Self in a Digital World: Table 1. Journal of Consumer Research, 40(3), 477–500. https://doi.org/10.1086/671052 Benedetto, L., & Ingrassia, M. (2021). Digital Parenting: Raising and Protecting Children in Media World. In L. Benedetto & M. Ingrassia (Eds.), Parenting. IntechOpen. https://doi.org/10.5772/intechopen.92579 Berns, R. (2016). Child, family, school, community. Socialization and support. Stanford. United States of America, 5(64), 93–98. Bessant, C. (2017). Parental sharenting and the privacy of children. Northumbria University Faculty of Business and Law, Faculty and Doctoral Conference, 28th - 29th June 2017, Newcastle, UK. Bessant, C. (2018). Sharenting: Balancing the Conflicting Rights of Parents and Children. Communications Law, 23(1), 7–24. Bessant, C., & Nottingham, E. (2020). Sharenting in a socially distanced world. Parenting for a Digital Future., 1–2. Biglan, A., Flay, B. R., Embry, D. D., & Sandier, I. N. (2012). The Critical Role of Nurturing Environments for Promoting Human Weil-Being. American Psychologist, 16. Blum-Ross, A., & Livingstone, S. (2017). “Sharenting,” parent blogging, and the boundaries of the digital self. Popular Communication, 15(2), 110–125. https://doi.org/10.1080/15405702.2016.1223300 Brooks, J. (2008). The Process of Parenting. In The Process of Parenting (pp. 116–117). Pustaka Belajar. Brosch, A. (2016). When the child is born into the internet: Sharenting as a growing trend among parents on Facebook. New Educational Review, 43(1), 224–235. https://doi.org/10.15804/tner.2016.43.1.19 Brosch, A. (2018). Sharenting – Why do parents violate their children’s privacy? New Educational Review, 54(4), 75–85. https://doi.org/10.15804/tner.2018.54.4.06 Byrne, S., Rodrigo, M. J., & Máiquez, M. L. (2014). Patterns of individual change in a parenting program for child maltreatment and their relation to family and professional environments. Child Abuse & Neglect, 38(3), 457–467. https://doi.org/10.1016/j.chiabu.2013.12.008 Centers for Disease Control and Prevention. (2014). Understanding Child Maltreatment 2014 (p. 2). http://www.cdc.gov/violenceprevention/pdf/cm-factsheet-a.pdf Children’s Online Privacy Protection Act (COPPA). (2002). Protecting Children’s Privacy Under COPPA: A Survey on Compliance. Federal Trade Commission. http://www.ftc.gov/ogc/coppa1.htm Choi, G. Y., & Lewallen, J. (2018). “Say Instagram, Kids!”: Examining Sharenting and Children’s Digital Representations on Instagram. Howard Journal of Communications, 29(2), 144–164. https://doi.org/10.1080/10646175.2017.1327380 Collins English Dictionary. (2014). Opinion—Definition of opinion by The Free Dictionary. 12th Edition. http://dictionary.reference.com/browse/database Comer, J. S., & Barlow, D. H. (2014). The occasional case against broad dissemination and implementation: Retaining a role for specialty care in the delivery of psychological treatments. American Psychologist, 69(1), 1–18. https://doi.org/10.1037/a0033582 Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior, 20(2), 103–127. https://doi.org/10.1080/016396299266524 Fitri, S. (2017). Dampak Foditif dan Negatif Sosial Media terhadap Sosial Anak. NATURALISTIC: Jurnal Kajian Penelitian Pendidikan Dan Pembelajaran, 1(2), 118–123. https://doi.org/10.35568/naturalistic.v1i2.5 Fox, A. K., & Hoy, M. G. (2019). Smart Devices, Smart Decisions? Implications of Parents’ Sharenting for Children’s Online Privacy: An Investigation of Mothers. Journal of Public Policy & Marketing, 38(4), 414–432. https://doi.org/10.1177/0743915619858290 Fridha, M., & Irawan, R. E. (2020). Eksploitasi Anak Melalui Akun Instagram (Analisis Wacana Kritis Praktek Sharenting oleh Selebgram Ashanty & Rachel Venya). Komuniti: Jurnal Komunikasi dan Teknologi Informasi, 12(1), 68–80. https://doi.org/10.23917/komuniti.v12i1.10703 Friedman, S. J. (2000). Children and the World Wide Web. University Press of America. Hammond, S. I., Müller, U., Carpendale, J. I. M., Bibok, M. B., & Liebermann-Finestone, D. P. (2012). The effects of parental scaffolding on preschoolers’ executive function. Developmental Psychology, 48(1), 271–281. https://doi.org/10.1037/a0025519 Holzer, P. J., Higgins, J., Bromfield, L., Richardson, N., & Higgins, D. (2006). The effectiveness of parent education and home visiting child maltreatment prevention programs. Australian Institute of Family Studies. Koetse, M. (2019). ‘Sharenting’ on Chinese Social Media: When Parents Are Posting Too Many Baby Pics on WeChat. What’s on Weibo Reporting Social Trends in China. Krisnawati, E. (2016). Mempertanyakan Privasi di Era Selebgram: Masih Adakah? Jurnal IIlmu Komunikasi, 13(2), 179. https://doi.org/10.24002/jik.v13i2.682 Latipah, E., Adi Kistoro, H. C., Hasanah, F. F., & Putranta, H. (2020). Elaborating motive and psychological impact of sharenting in millennial parents. Universal Journal of Educational Research, 8(10), 4807–4817. https://doi.org/10.13189/ujer.2020.081052 Leaver, T. (2020). Balancing privacy: Sharenting, intimate surveillance, and the right to be forgotten. In The Routledge Companion to Digital Media and Children. https://doi.org/10.33767/osf.io/fwmr2 Lee, S. J., Ward, K. P., Chang, O. D., & Downing, K. M. (2021). Parenting activities and the transition to home-based education during the COVID-19 pandemic. Children and Youth Services Review, 122, 105585. https://doi.org/10.1016/j.childyouth.2020.105585 Lundahl, B., Risser, H., & Lovejoy, M. (2006). A meta-analysis of parent training: Moderators and follow-up effects. Clinical Psychology Review, 26(1), 86–104. https://doi.org/10.1016/j.cpr.2005.07.004 Lwin, M., Stanaland, A., & Miyazaki, A. (2008). Protecting children’s privacy online: How parental mediation strategies affect website safeguard effectiveness. Journal of Retailing, 84(2), 205–217. https://doi.org/10.1016/j.jretai.2008.04.004 Manganello, J. A., Falisi, A. L., Roberts, K. J., Smith, K. C., & McKenzie, L. B. (2016). Pediatric injury information seeking for mothers with young children: The role of health literacy and ehealth literacy. Journal of Communication in Healthcare, 9(3), 223–231. https://doi.org/10.1080/17538068.2016.1192757 Manotipya, P., & Ghazinour, K. (2020). Children’s Online Privacy from Parents’ Perspective. Procedia Computer Science, 177, 178–185. https://doi.org/10.1016/j.procs.2020.10.026 Marasli, M., Sühendan, E., Yilmazturk, N. H., & Cok, F. (2016). Parents’ shares on social networking sites about their children: Sharenting. Anthropologist, 24(2), 399–406. https://doi.org/10.1080/09720073.2016.11892031 Mikton, C., & Butchart, A. (2009). Child maltreatment prevention: A systematic review of reviews. Bulletin of the World Health Organization, 87(5), 353–361. https://doi.org/10.2471/BLT.08.057075 Miyazaki, A. D. (2008). Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage. Journal of Public Policy & Marketing, 27(1), 19–33. https://doi.org/10.1509/jppm.27.1.19 Morris, A. S., Robinson, L. R., Hays-Grudo, J., Claussen, A. H., Hartwig, S. A., & Treat, A. E. (2017). Targeting Parenting in Early Childhood: A Public Health Approach to Improve Outcomes for Children Living in Poverty. Child Development, 88(2), 388–397. https://doi.org/10.1111/cdev.12743 Moser, C., Chen, T., & Schoenebeck, S. Y. (2017). Parents? And Children?s Preferences about Parents Sharing about Children on Social Media. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 5221–5225. https://doi.org/10.1145/3025453.3025587 Nooraeni, R. (2017). Implementasi Program Parenting Dalam Menumbuhkan Perilaku Pengasuhan Positif Orang Tua Di PAUD Tulip Tarogong Kaler Garut. Jurnal Pendidikan Luar Sekolah, 13(2). Nottingham, E. (2013). ‘Dad! Cut that Part Out!’ Children’s Rights to Privacy in the Age of ‘Generation Tagged’: Sharenting, digital kidnapping and the child micro-celebrity. In Journal of Chemical Information and Modeling. O’Keeffe, G. S., Clarke-Pearson, K., & Council on Communications and Media. (2011). The Impact of Social Media on Children, Adolescents, and Families. PEDIATRICS, 127(4), 800–804. https://doi.org/10.1542/peds.2011-0054 Pan, X., & Yu, H. (2018). Different Effects of Cognitive Shifting and Intelligence on Creativity. The Journal of Creative Behavior, 52(3), 212–225. https://doi.org/10.1002/jocb.144 Prasetyo, Dimas., Syahnas, A. N. R., Fajriani, A., Nugraha, H. G., & Suryani, S. (2019). “Saya hanya mengunggah foto dan video anak saya ”. Intenational Conference on ECEP. Putra, A. M., & Febrina, A. (2019). Fenomena Selebgram Anak: Memahami Motif Orang tua. Jurnal ASPIKOM, 3(6), 1093–1108. https://doi.org/10.24329/aspikom.v3i6.396 Sakashita, M., & Kimura, J. (2011). Daughter as Mother’s Extended Self. In European advances in consumer research (In A. Bradshaw, C. Hackley, P. Maclaran (Eds.), Vol. 9, pp. 283–289). Association for Consumer Research. Salleh, A. S., & Noor, N. A. Mohd. (2019). Sharenting: Implikasinya dari Persepektif Perundangan Malaysia. Jurnal Undangundang Malaysia, 31(1), 121–156. Sanders, M. (2012). Development, evaluation, and multinational dissemination of the triple P-Positive Parenting Program. Annual Review of Clinical Psychology, 8, 345–379. Santini, P. M., & Williams, L. C. (2016). Parenting Programs to Prevent Corporal Punishment: A Systematic Review. Paidéia (Ribeirão Preto), 26(63), 121–129. https://doi.org/10.1590/1982-43272663201614 Sarkadi, A., Dahlberg, A., Fängström, K., & Warner, G. (2020). Children want parents to ask for permission before ‘sharenting’. Journal of Paediatrics and Child Health, 56(6), 981–983. https://doi.org/10.1111/jpc.14945 Shumaker, C., Loranger, D., & Dorie, A. (2017). Dressing for the Internet: A study of female self-presentation via dress on Instagram. Fashion, Style & Popular Culture, 4(3), 365–382. https://doi.org/10.1386/fspc.4.3.365_1 Siibak, A., & Traks, K. (2019). Viewpoints The dark sides of sharenting. Catalan Journal of Communication & Cultural Studies, 11(1), 115–121. https://doi.org/10.1386/cjcs.11.1.115 Sobur, A. (2001). Pers, Hak Privasi, dan Hak Publik. Mediator, 2(1), 81–91. http://dx.doi.org/10.24329/aspikom.v3i6.396 Steinberg, S. B. (2017). Sharenting: Children’s Privacy in the Age of social media. EMORY LAW JOURNAL, 66, 47. Traube, D. E., Hsiao, H.-Y., Rau, A., Hunt-O’Brien, D., Lu, L., & Islam, N. (2020). Advancing Home Based Parenting Programs through the Use of Telehealth Technology. Journal of Child and Family Studies, 29(1), 44–53. https://doi.org/10.1007/s10826-019-01458-w Trivette, C. M., & Dunst, C. J. (2009). Community-Based Parent Support Programs. 7. van der Velden, M., & El Emam, K. (2013). “Not all my friends need to know”: A qualitative study of teenage patients, privacy, and social media. Journal of the American Medical Informatics Association, 20(1), 16–24. https://doi.org/10.1136/amiajnl-2012-000949 Verswijvel, K., Walrave, M., Hardies, K., & Heirman, W. (2019). Sharenting, is it a good or a bad thing? Understanding how adolescents think and feel about sharenting on social network sites. Children and Youth Services Review, 104, 104401. https://doi.org/10.1016/j.childyouth.2019.104401 Wagner, A., & Gasche, L. A. (2018). Sharenting: Making decisions about other’s privacy on social networking sites. MKWI 2018 - Multikonferenz Wirtschaftsinformatik. World Health Organization (WHO). (2016). INSPIRE seven strategies for ending violence against children. World Health Organization. Wyatt Kaminski, J., Valle, L. A., Filene, J. H., & Boyle, C. L. (2008). A Meta-analytic Review of Components Associated with Parent Training Program Effectiveness. Journal of Abnormal Child Psychology, 36(4), 567–589. https://doi.org/10.1007/s10802-007-9201-9 Zeeuw, A. De, Media, M. A. N., & Culture, D. (2018). Exposing Childhoods Online (Issue June).
APA, Harvard, Vancouver, ISO, and other styles
21

Bygrave, Lee A. "The Privacy Act 1988 (CTH): A Study in the Protection of Privacy and the Protection of Political Power." Federal Law Review 19, no. 2 (June 1990): 128–53. http://dx.doi.org/10.1177/0067205x9001900203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pearce, Matthew. "Policy Discourse and the 1982 ABT Pay TV Inquiry." Media International Australia 91, no. 1 (May 1999): 149–61. http://dx.doi.org/10.1177/1329878x9909100114.

Full text
Abstract:
The 1982 ABT Pay TV Inquiry revealed the complexities of broadcasting policy discourse in contemporary Australian government. The inquiry became a crucible in which discourses of public interest, and alliances of private interests, were distilled. Throughout the inquiry, and in the resulting report, the ‘public interest’ was continuously invoked to purchase legitimacy in the policy process. Yet the ‘public interest’ is a contested, malleable concept with no definite singular meaning. This paper examines and explains the various concepts which were used to underpin notions of the public interest in a contested policy zone.
APA, Harvard, Vancouver, ISO, and other styles
23

Hile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia." Journal of Telecommunications and the Digital Economy 9, no. 2 (June 29, 2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.

Full text
Abstract:
The increasing prevalence of large-scale data breaches prompted Australia to strengthen the Privacy Act by enacting the Privacy Amendment (Notifiable Data Breaches) Act to regulate the behaviour of entities entrusted with personal data. However, this paper argues that these legislative instruments are ineffective when dealing with data breaches and their associated problems. In supporting this conclusion, this paper first develops a criterion for effective data breach law, and then evaluates the Australian framework against this criterion to determine its operational effectiveness. In addition, this paper analyses practical developments in the area of data-breach law to garner insights as to how the Australian framework can be made more effective. Ultimately, this paper concludes that the Australian framework is ineffective when dealing with large-scale data breaches, and recommends future legislative amendment as a means of bolstering its effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
24

Wagner, J., and N. Witzleb. "Australia ∙ ‘Personal Information’ in the Australian Privacy Act and the Classification of IP Addresses." European Data Protection Law Review 3, no. 4 (2017): 528–33. http://dx.doi.org/10.21552/edpl/2017/4/17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Otlowski, Margaret F. A. "Disclosure of genetic information to at‐risk relatives: recent amendments to the Privacy Act 1988 (Cwlth)." Medical Journal of Australia 187, no. 7 (October 2007): 398–99. http://dx.doi.org/10.5694/j.1326-5377.2007.tb01311.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Flynn, Kathryn. "Financial fraud in the private health insurance sector in Australia." Journal of Financial Crime 23, no. 1 (December 31, 2015): 143–58. http://dx.doi.org/10.1108/jfc-06-2014-0032.

Full text
Abstract:
Purpose – The purpose of this article is to explore financial fraud in the private health insurance sector in Australia. Fraud in this sector has commonalities to other countries with similar health systems but in Australia it has garnered some unique characteristics. This article sheds light on these features, especially the fraught relationship between the private health funds and the public health insurance agency, Medicare and the problematic impact of the Privacy Act on fraud detection and financial recovery. Design/methodology/approach – A qualitative methodological approach was used, and interviews were conducted with fraud managers from Australia’s largest private health insurance funds and experts in fields connected to health fraud detection. Findings – All funds reported a need for more technological resources and higher staffing levels to manage fraud. Inadequate resourcing has the predictable outcome of a low detection and recovery rate. The fund managers had differing approaches to recovery action and this ranged from police action, the use of debt recovery agencies, to derecognition from the health fund. As for present and future harm to the industry, the funds found on-line claiming platforms a major threat to the integrity of their insurance system. In addition, they all viewed the Privacy Act as an impediment to managing fraud against their organizations and they desired that there be greater information sharing between themselves and Medicare. Originality/value – This paper contributes to the knowledge of financial fraud in the private health insurance sector in Australia.
APA, Harvard, Vancouver, ISO, and other styles
27

Gately, D. J. "QUEENSLAND PETROLEUM ACT REVIEW AND REFORM." APPEA Journal 29, no. 1 (1989): 72. http://dx.doi.org/10.1071/aj88011.

Full text
Abstract:
On 12 May 1988 amendments to the Queensland Petroleum Act of 1923 came into force. These empower the Governor- in- Council to appoint a Pipelines Tribunal to inquire into the operations of any existing or proposed pipeline. The Act now affirms the existence of the Secretary of Mines as a Corporation which can undertake all the aspects of an oil company from exploration to distribution of refined products. In particular, this corporation now has the sole right to construct and operate any pipeline in Queensland which extends beyond the boundaries of a lease. There was little or no dialogue with industry prior to the proclamation of these amendments.In comparison with the Petroleum Acts of South Australia, Western Australia and the Northern Territory, the Queensland Petroleum Act contains many areas subject to ministerial discretion or which are no longer relevant to present- day administrative practices. The Queensland Government's proposal to issue a green paper discussing amendments to the Act, based on submissions from interested parties, is welcomed since it is in the interests of management of the exploratory oil industry to strive for uniformity of administration in each state.
APA, Harvard, Vancouver, ISO, and other styles
28

Carey, Hilary M. "Lancelot Threlkeld, Biraban, and the Colonial Bible in Australia." Comparative Studies in Society and History 52, no. 2 (April 2010): 447–78. http://dx.doi.org/10.1017/s0010417510000101.

Full text
Abstract:
Ethnographers, historians, and linguists have argued for many years about the nature of the relationship between missionaries and their collaborators. Critics of missionary linguistics and education have pointed out that Bible translations were tools forged for the cultural conquest of native people and that missionary impacts on local cultures nearly always destructive and frequently overwhelming (Comaroff and Comaroff 1997; Rafael 1988; Sanneh 1989). Sociolinguistic readings of scripture translation have emphasized the cultural loss inherent in the act of translation and even seemingly benign activities such as dictionary making (Errington 2001; Peterson 1999; Tomlinson 2006). To make this point, Rafael (1988: xvii) notes the semantic links between the various Spanish words for conquest (conquista), conversion (conversión), and translation (traducción). Historians, on the other hand, have generally been more skeptical about the power of mere words to exert hegemonic pressure on colonized people and have emphasized the more tangible power of guns and commerce as agents of empire (Porter 2004). Few would deny the symbolic power of the Bible as a representation of colonial domination, as in the saying attributed to Archbishop Desmond Tutu by Cox (2008: 4): “When the white man arrived, he had the Bible and we had the land; now, we have the Bible and he has the land.”
APA, Harvard, Vancouver, ISO, and other styles
29

Douglas, Michael, and Claudia Carr. "The Commercial Exceptions to Foreign State Immunity." Federal Law Review 45, no. 3 (September 2017): 445–68. http://dx.doi.org/10.22145/flr.45.3.4.

Full text
Abstract:
The Foreign States Immunities Act 1985 (Cth) provides that foreign states are immune to the jurisdiction of Australian courts, and that their property is immune from execution. Those immunities are subject to important ‘commercial exceptions’. First, foreign states are not immune in Australian proceedings insofar as they concern a ‘commercial transaction’. Second, foreign states are not immune from execution in respect of ‘commercial property’. The distinction between the commercial and the non-commercial may be difficult to pin down. With reference to recent case law, including the High Court's decision in Firebird Global Master Fund II Ltd v Republic of Nauru (2015) 258 CLR 31, this article aims to articulate the scope of the commercial exceptions. It is argued that the scope of the commercial transaction exception is uncertain, and depends on courts’ approach to the task of characterisation. It is also argued that the commercial property exception is undesirably narrow, and will present a recurring impediment to the vindication of private rights.
APA, Harvard, Vancouver, ISO, and other styles
30

Lea, Randall, and William Shaw. "Tools and Resources: Lower Extremity Conditions: Combination vs Duplication." Guides Newsletter 3, no. 1 (January 1, 1998): 4. http://dx.doi.org/10.1001/amaguidesnewsletters.1998.janfeb02.

Full text
Abstract:
Abstract This article discusses uses of the AMA Guides to the Evaluation of Permanent Impairment (AMA Guides) in Australia and New Zealand. In addition to its use in the United States, the AMA Guides also is used in Australia, New Zealand, Canada, and some European countries such as Ireland, the Netherlands, and Norway. Use of the AMA Guides varies from country to country, depending on local workers’ compensation or personal injury legislation. In Australia, the AMA Guides is used in various state systems, but the editions used or recommended may differ. Often, cases in which the impairment predates December 1988 (when the current Commonwealth Workers’ Compensation Act became effective) are assessed in terms of the AMA Guides, Fourth Edition. Although many physicians use the Fourth Edition, others refer to the Table of Disabilities (Div 4/S66 of the New South Wales Workers’ Compensation Act) and Victoria prefers the AMA Guides, Second Edition. At the federal level, Australia has adopted the Guide to the Assessment of the Degree of Permanent Impairment (1989 but under revision at the time of writing). In New Zealand, the Accident Compensation Commission officially adopted use of the AMA Guides, Fourth Edition, in 1997.
APA, Harvard, Vancouver, ISO, and other styles
31

Johnson, Jackie. "Australia: Working Within the Law — The Attitudes of Reporting Officers to the Financial Transaction Reports Act 1988." Journal of Financial Crime 8, no. 2 (April 2000): 162–70. http://dx.doi.org/10.1108/eb025980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Morrison, David. "Trustees in insolvency: the manifestation of Australia’s fascination with the use of the trust as a business vehicle." Trusts & Trustees 25, no. 10 (December 1, 2019): 995–1001. http://dx.doi.org/10.1093/tandt/ttz107.

Full text
Abstract:
Abstract Corporate trustees are prevalent in the operation of businesses in Australia. However, the Corporations Act in Australia makes no express provision for the insolvency of a corporate trustee. Given that the trading trust is often used for commercial purposes in Australia, together with a corporate trustee, it is important that the law reflects a clear and consistent approach in the event of the insolvency of a business owned by a trading trust. It is opined that the position of an insolvent corporate trustee ought to be, as far as possible, dealt with consistently with that of a business held directly by a company. Notwithstanding the recommendations of a 1988 inquiry reporting looming difficulty, no legislative correction has occurred. Consequently, a series of conflicting case law follows. This article considers recent developments in respect of judicial consideration in the context of the recommendations made more than 30 years previously.
APA, Harvard, Vancouver, ISO, and other styles
33

Coates, TD, and CJ Wright. "Predation of southern brown bandicoots Isoodon obesulus by the European red fox Vulpes vulpes in south-east Victoria." Australian Mammalogy 25, no. 1 (2003): 107. http://dx.doi.org/10.1071/am03107.

Full text
Abstract:
PREDATION by European red foxes (Vulpes vulpes) has been identified as at least partially responsible for local declines of populations of many small to medium-sized mammals in Australia and is listed as a ‘key threatening process’ under the Victorian Flora and Fauna Guarantee Act, 1988 and the Federal Environment Protection and Biodiversity Conservation Act, 1999. Foxes occur in large numbers throughout urban, suburban and rural areas where they opportunistically take carrion, small to medium-sized mammals, birds, insects and fruit (Menkhorst 1995; Marks and Bloomfield 1999). They also kill poultry and larger mammals such as macropod species and sheep (Menkhorst 1995). In many conservation areas, particularly in near-urban locations where fox densities are high, they are thought to pose a serious threat to biodiversity conservation (Menkhorst 1995; Friend et al. 2001; Mahon 2001).
APA, Harvard, Vancouver, ISO, and other styles
34

Marcinkowski, Bartosz. "OCHRONA DANYCH OSOBOWYCH W IRLANDII." Zeszyty Prawnicze 8, no. 2 (June 25, 2017): 243. http://dx.doi.org/10.21697/zp.2008.8.2.11.

Full text
Abstract:
Personal Data Protection in IrelandSummaryThe article is a short review of the personal data protection system in the Republic of Ireland. The review is made in the light of the Polish Data Protection Act of 1997 and Directive 95/46/EC (sections I and II).The introductory parts (sections I and II) include general remarks on the increasing importance and value of privacy and personal data. This increase results, among other things, from rapid development of the Internet and modern data processing and mining measures.Subsequently, in section III, the author discusses the constitutional environment of privacy and personal data protection rules in Ireland, as well as the role of court precedents and Directive 95/46/EC in this respect.Next part of the article (section IV) is dedicated to practical data protection issues identified and discussed by Irish authors, including specific exposures as well as differences between definitions in the Irish Data Protection Acts 1988-2003 and the UK Data Protection Act 1998, and influence of the latter (UK) Act on the Irish Data Protection Commissionaire’s decisionmaking process.Further comments (section V) focus on Data Protection Commissionaire’s rights and obligations (including in particular comments on the Data Protection Commissionaire’s free and friendly consultancy policy).The conclusion (section VI) briefly and synthetically summarizes similarities and differences between Irish and Polish personal data protection rules and practices, stressing issues requiring the European-wide common approach (e.g. in the fields of basic definitions or CCTV legal issues).Finally, the author observes that Polish authors’ reflections on personal data protection and the Polish practice are not inferior to the Irish ones even though Irish regulations have been in place for 10 years longer than the Polish ones.
APA, Harvard, Vancouver, ISO, and other styles
35

Ms. Poonam Pant, and Ms. Bhumika Sharma. "Liability of Internet Service Providers Across Various Countries: An Overview." Legal Research Development: An International Refereed e-Journal 4, no. 1 (September 30, 2019): 06–09. http://dx.doi.org/10.53724/lrd/v4n1.04.

Full text
Abstract:
The role of I.S.P. or Intermediary is very important for effective utilization of information technology. The liability of Intermediary or I.S.P. has gain immense importance at international level. Various countries have defined the liability of I.S.P. either in the form of copyright infringement or for the infringement of information technology. Australia was the first country to enact the legislation relating to the liability aspect of I.S.P. in the form of Copyright Act, 1968 making I.S.P. liable to disable the access to online services hosted outside Australia. Some safe harbors were also provided for I.S.P. as part of the Australia - United States Free Trade Agreement. The US provides for the liability of ISP in the form of Communications Decency Act, 1996, Digital Millennium Copyright Act,1998. Title II of the D.M.C.A. specifically deals with the issue of I.S.P. liability and also provides for the penalties for unauthorized access to a copyright work. As regarding the legislations of Canada, it does not specifically defines the liability of I.S.P., instead it provides safe harbor for those ISP’s providing any means for Internet access. I.S.P.’s are also protected for copyright infringement in Canada. In Singapore the liability of I.S.P. is regulated by the Internet class license and Internet code of Practice which requires the I.S.P. to abide by the conditions of license. I.S.P.’s are also restricted to make public access of those websites which contain offensive content harmful to national interest. Japan’s Copyright Act, 1970, The Provider Liability Limitation Law 2002 protects the I.S.P. against any kind of liability for Copyright infringement. UK enacted two legislations in form of Copyright, Designs and Patents Act 1988 Digital Economy Act 2010 which imposes the obligations on ISP to notify the infringement to its subscribers, also liable to take technical measures to terminate the Internet services after reporting of infringement. The countries also make the provisions for the penalties for offences relating to the infringement of copyright or unauthorized access of information by various I.S.P.’s or Intermediaries. The quantum of punishment is differed in every country according to the nature of offence.
APA, Harvard, Vancouver, ISO, and other styles
36

Norris, R. P., Michael J. Batty, M. J. Kesteven, and K. J. Wellington. "The Parkes-Tidbinbilla Interferometer." Publications of the Astronomical Society of Australia 6, no. 2 (1985): 137–40. http://dx.doi.org/10.1017/s1323358000017938.

Full text
Abstract:
AbstractWe report the development of a radio-linked interferometer which uses the 64-m telescope at Parkes, NSW, and one of the NASA antennas (64-m or 34-m) at Tidbinbilla, ACT. With a baseline of approximately 275 km, this is the world’s longest real-time interferometer; it will be usable at frequencies of 1.6, 2.3, 8.4, and 22 GHz to give angular resolutions of 0.13, 0.09, 0.03, and 0.01 arcsec respectively. The interferometer has already operated successfully in a limited mode and is expected to become fully operational in its initial configuration by September 1985. Operation at a range of frequencies and with progressive enhancements is planned up to the commissioning of the Australia Telescope in 1988.
APA, Harvard, Vancouver, ISO, and other styles
37

McQueenf, Rob. "Your Money and Your Life: Cash Transaction Reporting Legislation, Neo-Liberal Philosophy and the Governance of the Self." Australian & New Zealand Journal of Criminology 27, no. 2 (September 1994): 174–91. http://dx.doi.org/10.1177/000486589402700206.

Full text
Abstract:
Opponents of enactments such as the Financial Transactions Reports Act 1988 (Cth) and Proceeds of Crime Act 1987 (Cth) have principally based their opposition on the basis that such legislation and the regimes which it supports represent a fundamental attack on traditional domains of ‘privacy’. This paper questions the validity of such small T critiques and suggests that such analyses may play into the hands of ‘New Right’ agendas, rather than acting contrary to them. The assumptions lying behind the introduction of financial transaction reporting (FTR) are examined in the context of a variety of ‘New Right’ analytical frameworks. In particular the paper examines FTR in light of the assumption that commercial actors should be ‘free’ of government intervention to pursue their entrepreneurial activities. In this and other respects it is asserted that FTR acts contrary to, rather than as component of, a New Right agenda. The paper also explores the applicability of the Foucauldian notion of ‘governmentality’ in respect to recent developments in financial reporting and monitoring. The manner in which FTR legislation has influenced the ‘conduct’ of commercial actors is examined in some depth. So too is the question of the potential limits (if any) to the encroachment by the state into the previously ‘private’ conduct of both those who operate and those who use the banking and financial system.
APA, Harvard, Vancouver, ISO, and other styles
38

Blay, Sam, and Julia Green. "The practicalities of domestic legislation to prohibit mining activity in Antarctica: a comment on the Australian perspective." Polar Record 30, no. 172 (January 1994): 23–32. http://dx.doi.org/10.1017/s0032247400021008.

Full text
Abstract:
AbstractAfter its rejection of the Minerals Convention adopted by the Antarctic Treaty Consultative Parties (ATCPs) in 1988, Australia took a major step in its domestic law by enacting the Antarctic Mining Prohibition Act of 1991 (AMPA), to reinforce its general objection to mineral resource activities in Antarctica and its commitment to the protection ofthe Antarctic environment. With the adoption of the Protocol on Environmental Protectionto the Antarctic Treaty (the Madrid Protocol) – which required the parties to take steps to implement its provisions, including the enactment of domestic legislation – Australia enacted the Antarctic Treaty (Environmental Protection) Act (ATEPA). The ATEPA is meant to replace the AMPA once the Madrid Protocol comes into force. The Protocol bans mineral resource activities in Antarctica and adopts a comprehensive regime toregulate all human activity in Antarctica in an effort to protect the region's environment. As legislation to implement the Protocol, the principal objectives of the ATEPAare to prohibit mineral resource activities in the Australian Antarctic Territory and toregulate all human activity that may have a direct impact on the environment in the area. It also prohibits Australian nationals from engaging in mineral resource activities elsewhere in Antarctica. Like Australia, a number of ATCPs have either adopted legislationor are developing legislation in their domestic legal systems to implement the Protocol.It is one thing for the Protocol to demand the adoption of domestic legislation to ensure compliance with its provisions, including the ban on mining; it is quite another thingto develop effective domestic legislation on the issue. Given the absence of any knowncommercially exploitable deposits of minerals in Antarctica, the likelihood of any mineralresource activity in the region is very remote. But should mining activity occur in Antarctica in breach of the Protocol, the enforcement of the ban could be fraught with practical, legal, and policy difficulties. This paper examines the domestic legislative efforts by Australia as a leading ATCP to ban mining activity in Antarctica. Even though the discussion focuses on Australia by examining its legislation, the problems and the issues raised in the Australian context are also relevant to other ATCPs generally and to claimants in particular.
APA, Harvard, Vancouver, ISO, and other styles
39

Du Bois, Mikhalien. "State Use Provisions for Patent Law, and Expropriations: Some Comparative Law Guidelines for South Africa during the Covid-19 Crisis and Beyond." Potchefstroom Electronic Law Journal 23 (September 15, 2020): 1–35. http://dx.doi.org/10.17159/1727-3781/2020/v23i0a8150.

Full text
Abstract:
This article views section 4 of the Patents Act 57 of 1978 against section 25 of the Constitution of the Republic of South Africa, 1996 and Article 31 of the Agreement on Trade-Related Aspects of Intellectual Property Rights of 1994 (hereafter TRIPS). The purpose is to find a suitable framework for the state/government use/utilisation of patented products or processes for public purposes. A comparison is done with the Crown use provisions in United Kingdom, Australian and Canadian law to find a suitable approach to questions relating to remuneration for state use, the prior negotiations requirement set by Article 31 of TRIPS, and the public purposes and exclusive patent rights that would be included under state use. The COVID-19 international pandemic has caused a state of national disaster in South Africa, which is exactly the kind of situation of extreme urgency envisioned by the exception in Article 31 of TRIPS, which permits the state use of patents without requiring prior negotiations with the patent owner. In the battle against COVID-19 and its concomitant fallout, the South African government (and authorised private parties) would be permitted to utilise patent rights without explicit authorisation from the patent owner and without prior negotiations, but subject to the payment of reasonable remuneration by the government and other terms and conditions as agreed upon or as determined by a court. This may include making (manufacturing), using, exercising, and importing patented products (for example, personal protective equipment, pharmaceuticals, ventilators and diagnostic tests) deemed necessary in the fight against COVID-19. Foreign jurisdictions considered in this article indicate that section 4 of the Patents Act 57 of 1978 may certainly benefit from an update to provide detailed guidance on the state use of patented products or processes for public purposes. In the interest of a timeous offensive against the COVID-19 virus, the patent provisions need a speedy update to allow state use compliant with TRIPS and the Constitution of the Republic of South Africa, 1996.
APA, Harvard, Vancouver, ISO, and other styles
40

Agudelo Motta, María Lucia, Daniel Francisco Osorio Ortega, Adriana Carolina Rubio Roa, and Orietta Ivonne Beltrán Casas. "Privacidad y confidencialidad de los datos genéticos y genómicos de uso diagnóstico en Colombia." Revista Latinoamericana de Bioética 22, no. 1 (June 21, 2022): 29–44. http://dx.doi.org/10.18359/rlbi.5196.

Full text
Abstract:
La información genética y genómica requiere regulaciones estrictas para su manejo adecuado con el fin de evitar la divulgación inapropiada y la discriminación secundaria, pues tiene una relación directa con los derechos fundamentales y los principios bioéticos. De ahí la necesidad de evaluar la regulación colombiana existente, por lo que se realizó una revisión sistemática de la literatura en bases de datos del 2000 al 2020, sitios web del Congreso de la República de Colombia, la Comisión de Reforma de la Ley Australiana y la Corte Constitucional de Colombia, para identificar las falencias y los aciertos en la jurisprudencia actual del manejo, el control y la accesibilidad de la población colombiana a las pruebas e información genética. Se toma como referente Australia para comprender y plantear mejoras. Se encontró que en Colombia la información genética se cataloga como sensible (Sentencia C-334-10) con regulaciones inespecíficas sin norma legislativa. En contraste, Australia dispone de directrices bioéticas específicas, penalización y protocolos que abarcan las implicaciones individuales y colectivas descritas en el Privacy Legislation Amendment Act del 2006. Es necesario que en Colombia se cree una regulación jurídica específica para la información genética y genómica con énfasis en pautas de uso sobre la privacidad, la divulgación y la no discriminación.
APA, Harvard, Vancouver, ISO, and other styles
41

Blondell, Sarah J., Joseph Debattista, Mark P. Griffin, and Jo Durham. "'I think they might just go to the doctor': qualitatively examining the (un)acceptability of newer HIV testing approaches among Vietnamese-born migrants in greater-Brisbane, Queensland, Australia." Sexual Health 18, no. 1 (2021): 50. http://dx.doi.org/10.1071/sh20064.

Full text
Abstract:
Background In high-income countries (HICs), migrants often have higher rates of late diagnosis of HIV than the host population. Timely HIV testing has significant implications for HIV prevention and management. Newer HIV testing approaches, namely provider-initiated testing and counselling (PITC), HIV rapid testing (HIV RT) and HIV self-testing (HIV ST), aim to reach those populations most at risk and, particularly, those who have not previously tested for HIV. Methods: This study used semi-structured interviews to examine the (un)acceptability, barriers and facilitators to newer HIV testing approaches (i.e. PITC, HIV RT and HIV ST) among Vietnamese-born migrants (n = 10) in greater-Brisbane, Queensland, Australia. Results: Vietnamese-born migrants had mixed perspectives on the (un)acceptability of newer HIV testing approaches. PITC was largely viewed by participants as a facilitator to HIV testing for Vietnamese-born migrants. Likewise, HIV RT (undertaken by a doctor in a medical setting, as opposed to a trained community member in a community setting) was generally considered to facilitate HIV testing. HIV ST was largely not considered acceptable to Vietnamese-born migrants and they would prefer to go to a doctor for HIV testing. Several factors were identified that either facilitate or act as barriers to newer HIV testing approaches, including privacy; cost of (accessing) HIV testing; comfort and convenience; healthcare provider relationship; risk perception; symptoms; and technical and emotional support. Conclusions: There is a need to understand migrants’ HIV testing preferences if poorer HIV-related outcomes are to be overcome. The findings from this study show a preference for doctor-centred HIV testing, due to enhanced privacy, accuracy and support.
APA, Harvard, Vancouver, ISO, and other styles
42

Osmond, Craig. "Anti-social behaviour and its surveillant inter-assemblage." Surveillance & Society 7, no. 3/4 (July 6, 2010): 325–43. http://dx.doi.org/10.24908/ss.v7i3/4.4159.

Full text
Abstract:
This paper describes a recent initiative in NSW, Australia in the state government’s “fight against anti-social behaviour”. The Anti-Social Behaviour Pilot Project has developed a surveillance regime that exempts justice and human service public authorities from existing privacy laws so that these agencies can share risk intelligence about targeted young people for a more integrated and multi-agency intensive management of risk. A detailed account of the ensemble of statements that have shaped and made this highly politicised risk governance possible is outlined. The initiative seeks to establish a more flexible mode of surveillance capable of intervening into cases of persistent risks linked to the possibility of criminal offending and the risks of persistent offending that have both become linked to public safety. Two analytical frames are used to make sense of the project. Firstly, its nodal technique for integrating case management risk across governmental assemblages (police, health etc) is analysed as an exemplar of a post-panoptical surveillant inter-assemblage designed for the networked control of young people. Secondly, Agamben’s (1988, 2005) account of the state of exception is used to demonstrate how the project’s extra-legal administrative procedures for managing risks linked to “the public interest” establish a spatial arrangement for the control of young people based on decisions of exclusion that are paradoxically located inside and outside the law.
APA, Harvard, Vancouver, ISO, and other styles
43

Мочалов, Артур Николаевич. "ON THE ESTABLISHMENT OF THE POSITION OF OMBUDSMAN FOR THE PROTECTION OF HUMAN RIGHTS WHEN USING INFORMATION TECHNOLOGIES IN RUSSIA." Rule-of-law state: theory and practice 18, no. 2(68) (July 4, 2022): 27–39. http://dx.doi.org/10.33184/pravgos-2022.2.3.

Full text
Abstract:
The article argues for the need to introduce the position of specialized ombudsman in the Russian Federation, whose competence will include the protection of human rights in the digital space, including the Internet. Purpose: to formulate and substantiate proposals for the establishment of the position of ombudsman for the protection of human rights in the field of information and telecommunication technologies. Methods: the research is based on the comparative legal method. The author analyzes the experience of foreign countries – Australia, Canada, Belgium, New Zealand, where independent state institutions operate to protect the rights of individuals when using information technologies, including the right to information and the right to privacy. The method of interpretation of legal norms and provisions of strategic documents of the Russian Federation is also applied. Results: analyzing Russian practice, the author concludes that federal executive authorities, in particular Roskomnadzor (Federal Service for Supervision of Communications, Information Technology and Mass Media), whose functions include the protection of the rights of subjects of personal data, cannot be considered as analogous human rights institutions. They are not independent and, therefore, cannot take sufficient action if other government agencies act as violators. For this reason, it is concluded that it is advisable to establish a specialized ombudsman.
APA, Harvard, Vancouver, ISO, and other styles
44

Wahren, C. H., R. J. Williams, and W. A. Papst. "Alpine and Subalpine Wetland Vegetation on the Bogong High Plains, South-eastern Australia." Australian Journal of Botany 47, no. 2 (1999): 165. http://dx.doi.org/10.1071/bt97106.

Full text
Abstract:
The botanical composition and structure of wetland vegetation from seven sites in the alpine and subalpine tracts of the Bogong High Plains was sampled in 1995 and 1996. Sites were in the vicinity of Mts Nelse, Cope and Fainter. Sampling was based on contiguous 1-m2 quadrats along transects 20−70 m long across each wetland. Samples were ordinated using non-metric multidimensional scaling (NMDS). Floristic variation was assessed both within selected individual wetlands, and between wetlands from different regions. The relationship between the ordinations and environmental variables such as soil surface texture, soil depth and the amount of bare ground was tested by fitting vectors. Three dominant vegetation assemblages were identified. Closed heath, of hygrophyllous, scleromorphic shrubs such as Richea continentis and Baeckea gunniana, the rush Empodisma minus and the moss Sphagnum cristatum occurred on the deeper peats. Low open heath of Epacris glacialis and Danthonia nivicola occurred on shallow peats. Herbfields of Caltha introloba and Oreobolus pumilio occurred on stony pavements in two different physiographic situations&horbar;on relatively steep slopes (10−20°) at the head of wetlands, and on flat ground (slope < 2°), below the head of wetlands. The pavements on the steeper sites appeared to be associated with periglacial features such as solifluction lobes and terraces. Those on the flatter ground appeared to have been derived more recently. Wetlands in the Mt Cope region consisted of closed heath, low open heath and pavement herbfield in various proportions. Wetlands on Mt Fainter, which are subject to heavy trampling by cattle, were in a degraded condition, with a low cover of major hygrophyllous mosses and shrubs, and a high cover of introduced species. Long-ungrazed wetlands in a 50-year exclosure at Rocky Valley had high cover of closed heath, no pavements, numerous ponds and virtually no entrenched drainage channels or exposed peat. The Caltha herbfields are significant features nationally, both floristically and geomorphologically. Alpine and subalpine wetlands have been listed under the Victorian Flora and Fauna Guarantee Act 1988, and continued grazing by cattle is not compatible with the conservation objectives for this alpine vegetation type.
APA, Harvard, Vancouver, ISO, and other styles
45

Bay, Uschi. "Unpacking neo-liberal technologies of government in Australian higher education social work departments." Journal of Social Work 11, no. 2 (April 2011): 222–36. http://dx.doi.org/10.1177/1468017310386696.

Full text
Abstract:
• Summary: This article analyses how neo-liberal and managerialist policies, over the last two decades in Australia, have positioned university staff as self-managing individuals. Social work academics are positioned as ‘free agents . . .empowered to act on their own behalf while ‘‘steered from a distance’’ by ‘‘policy norms and rules of the game’’ (Marginson, 1997, p. 63, italics added). Using governmentality theories as developed by Bacchi (2009), Burchell, Gordon, and Miller (1991), Dean (1996, 1999a, 1999b), Foucault (1983, 1986, 1988, 1990, 1991), Hindess (1997, 2003), Miller (1992), Barry, Osborne, and Rose (1996) and Rose (1999) and an analysis of how staff are positioned in higher education settings is explored. • Findings: This article identifies the ways neo-liberal policy and managerialism operates to enable power relations that both individualize and totalize academic staff, including social work academics. Efforts to transform power relations require an understanding of how particular situations are problematized and the identification of the governmental technologies employed to constitute the political identities of social work academics. • Applications: Identifying how neo-liberal technologies of government affect social work academics could stimulate a renewed struggle for change and reinvigorate political action in social work university departments and social work settings more broadly.
APA, Harvard, Vancouver, ISO, and other styles
46

Watson, Alysson. "The ‘digital death knock’: Australian journalists’ use of social media in reporting everyday tragedy." Australian Journalism Review 44, no. 2 (November 1, 2022): 245–62. http://dx.doi.org/10.1386/ajr_00106_7.

Full text
Abstract:
Newspapers regularly publish stories about people who have died suddenly or in unusual circumstances and the effect of these deaths on families and communities. The practice by which a journalist writes such a story is called the ‘death knock’; the journalist seeks out the deceased’s family to interview them for a story about their loss. The death knock is challenging and controversial. It has been criticized as an unethical intrusion on grief and privacy and shown to have negative effects on bereaved people and journalists. It has also been defended as an act of inclusion, giving the bereaved control over stories that may be written anyway, and a form of public service journalism that can have benefits for families, communities and journalists. Traditionally a knock on the door, the death knock is also done via phone and e-mail, and recently, in a practice termed the ‘digital death knock’, using social media. This article reports on the findings of a 2021 survey of Australian journalists and their current death knock practice and it will do this within the framework of research in the United States, the United Kingdom and Canada. In these countries, journalists are doing the ‘digital death knock’ because of time and competition pressures and available technology; however, this raises ethical concerns about their reproduction of social media material without the permission or knowledge of its owners. This article will discuss the extent to which social media has impacted death knock practice in Australia.
APA, Harvard, Vancouver, ISO, and other styles
47

Sheveleva, Svetlana, and I. Teneneva. "VOYEURISM: CRIMINAL AND CRIMINOLOGICAL ASPECTS." Scientific Notes of V. I. Vernadsky Crimean Federal University. Juridical science 7, no. 3 (December 12, 2022): 209–22. http://dx.doi.org/10.29039/2413-1733-2021-7-3(2)-209-222.

Full text
Abstract:
One of the types of paraphilia is voyeurism, i.e., secretly spying on the intimate actions of other people. From the point of view of medicine, voyeurism is recognized as a disorder of sexual preference, in art it has found expression in the paintings of famous masters, but from the point of view of morality it remains in the plane of religiously conditioned prohibitions, and psychologists say that the considered form of sexual behavior is dangerous not only for the psyche of the actor, but also for the victim. Within the framework of the presented research, the authors offer an analysis of the legal reaction of foreign countries to this form of sexual deviation, consider the types of punishments, and also present a criminological portrait of voyeurism. In the legal systems of foreign countries (Great Britain, Belgium, Singapore), voyeurism is recognized as a sexual crime; in the United States, Germany, New Zealand, and some states of Australia, the act in question is recognized as a crime that violates the «right to privacy». Separate statistical data on the specified acts in separate countries (where such counting is conducted) are presented, the reasons of growth of such encroachments and ways of their implementation are defined. In Russia, such acts receive a criminal-legal assessment on the grounds of Article 137 of the Criminal Code of the Russian Federation, which should be considered as a «legislative compromise», since in the actions of a voyeur, the main motive is sexual, and violation of privacy is not the goal. Some statistical data indicate an increase in such attacks in the world, but in Russia, the paraphilia in question is mainly the subject of research by psychologists, sexologists, and journalists. No serious criminological or criminal law studies were conducted. The presented research is the first attempt to study this phenomenon in the legal aspect, suggesting the beginning of a scientific discussion. It is concluded that in the conditions of digitalization of society, voyeurism as a form of sexual deviation will continue to develop, so it is necessary to adopt a set of legal measures aimed at protecting the rights of victims.
APA, Harvard, Vancouver, ISO, and other styles
48

A, Vathsala, and Khuan Yew Chow. "Renal Transplantation in Singapore." Annals of the Academy of Medicine, Singapore 38, no. 4 (April 15, 2009): 291–99. http://dx.doi.org/10.47102/annals-acadmedsg.v38n4p291.

Full text
Abstract:
Introduction: Renal transplantation is the best treatment for kidney failure. As the demand far exceeds the supply, various legislative measures have been put into place in Singapore to increase kidney transplant rates. This paper evaluates the impact of these measures and reports on the outcomes for kidney transplant recipients in Singapore. Materials and Methods: Patient demographics, recipient and donor characteristics, and co-morbidities occurring in incident transplant patients were extracted from Singapore Renal Registry (SRR) Reports from 1997 to 2006, tabulated and summarised. Graft and patient survivals data, which were calculated by Kaplan-Meier analysis until return to dialysis/pre-emptive renal re-transplant or patient death respectively, were extracted from SRR Reports. Published data from the United States Renal Data System (USRDS) and Organ Procurement and Transplantation Network (OPTN) were used for comparisons with data from the SRR. Results: The introduction of the Human Organ Transplant Act increased the rate of deceased donor (DD) kidney transplants from 4.7 per year from 1970 to 1988, to 41.4 per year from 1988 to 2004. In 2006, the overall DD and living donor (LD) rate for kidney transplants performed locally for Singaporeans and permanent residents of Singapore was 22.6 per million population (pmp); taking into account overseas kidney transplants, the kidney transplant rate was 33.0 pmp. One and 5-year graft survivals for local LD and DD transplanted between 1999 and 2006, as reported by the SRR, were 98.1% and 95.3% versus 88.9% and 81.3%, respectively (P <0.001). Patient survivals at 1 and 5 years were likewise significantly better for LD versus DD (99.4% and 96.6% vs. 96% and 89.1%, respectively; P = 0.005). Conclusions: The local kidney transplant rates were lower than those reported by the USRDS for the USA, Spain, Norway and Australia but higher than other Asian countries. While 1-year outcomes for transplants reported to the SRR were similar to that reported by the OPTN, 5-year survivals were significantly higher, possibly due to the selection of patients with fewer co- morbidities for kidney transplantation in Singapore. These results suggest that while outcomes are excellent, there is much more to be done to increase kidney transplantation rates in Singapore so as to meet the needs of end-stage renal failure patients in the country. Key words: Presumed consent, Singapore Renal Registry, Living donor, Kidney transplant, Deceased donor kidney transplant, Graft survival
APA, Harvard, Vancouver, ISO, and other styles
49

David-Pitt. "‘Innocents Abroad’ in the Forests of Nepal — an Account of Australian Aid to Nepalese Forestry, by David Michael Griffin. ANUTECH, GPO Box 4, Canberra, ACT 2601, Australia: xvi + 188 pp., illustr., 21 × 15 × 1 cm, $Aus. 28.50, paperback, 1988." Environmental Conservation 16, no. 4 (1989): 379–80. http://dx.doi.org/10.1017/s037689290001002x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Engelhardt, F. R. "Remote Sensing for Oil Spill Detection and Response." Pure and Applied Chemistry 71, no. 1 (January 1, 1999): 103–11. http://dx.doi.org/10.1351/pac199971010103.

Full text
Abstract:
Introduction: Remote sensing is useful in several modes of oil spill control, including large area surveillance, site specific monitoring and tactical assistance in emergencies. Remote sensing is able to provide essential information to enhance strategic and tactical decision-making, potentially reducing incidence of spills by providing a deterrent factor, decreasing response costs by facilitating rapid oil recovery and ultimately minimising impact. Marine oil spills can be separated into two categories of relevance to the type of remote sensing technology which might be used to detect and respond to the incident. A first category is non-accidental discharges, which can include incidental losses from vessels due to hull or equipment leaks, as well as oil discharged intentionally during deballasting and tank-cleaning activities. While these non-accidental discharges tend to be small in themselves, they are frequent and contribute much more to the overall introduction of oil to the marine environment than accidental spills, and are of increasing international regulatory concern. Accidental spills are much less frequent, but typically involves much larger releases of oil. Such oil spills are high profile events for which rapid and effective emergency response is needed to contain and recover the spilled oil. In many countries, an appropriate and effective response capability is required by law, such as demanded by the Oil Pollution Act of 1990 in the US, as well as by recent amendments to the Canada Shipping Act in Canada. There is a growing recognition that using remote sensing, especially airborne, to aid cleanup response efforts can mitigate the effects of oil on the environment, as well as reduce cleanup costs. Airborne remote sensing sensing in the support of spill response operations has a mixed level of interest by spill responders when viewed globally. In the US, for instance, airborne remote has had varying degrees of success in meeting operational expectations, and thus is not yet fully integrated into national, regional and area response plans and operations. By comparison, the record of successful use in the UK, for instance, is such that remote sensing support is contracted by the UK Coast Guard on a stand-by basis and used routinely when a significant spill occurs. As another example, airborne remote sensing technologies are now being adopted by the Australian Maritime Safety Authority to support its spill response actions. Low altitude aircraft have proven to be the most effective tactical method for obtaining information about spills and assisting in spill response. Combined with accurate oil drift computer model forecasting, these two methods were the primary strategic tools used for environmental response planning during the IXTOC-1 and Arabian Gulf spills, although less useful for guiding tactical operations (Pavia and Payton, 1983; Cekirge et al., 1992). Conversely, essential tactical support was provided by aerial remote sensing for the application of dispersants, a major spill response in the Sea Empress spill in Southwest Wales (Harris, 1997; Lunel et al., 1997). Currently, the use of imaging satellites for spill response is restricted because of limited spatial resolution, slow revisit times and often long delays in receipt of processed image data. The topic of oil spill monitoring by imaging satellites has been reviewed by Bern (1993a,b). There are significant advances being made, however, to increase resolution and coverage, as well as in the speed of image product delivery. Sensing oil on water by satellites appears best suited for routine surveillance purposes. There are synergisms in protecting the environment and property from oil spills which can be achieved by an integrated approach which draws on the remote sensing advantages of airborne and satellite imaging technology. There are many potential users of such remote sensing information, in government and private sector organisations. Government authorities use such information in surveillance, for example in the North and Baltic Seas, detecting spills when they occur and for identification of the spiller, which could be a vessel discharging illegally. Many government organisations also maintain an organised oil spill response capability, which would be supported by remote sensing information in oil spill response operations. The private sector includes the primary oil industry operating globally, and oil transporters, which carry responsibility and potential liability in the event of a spill. Other potential users are oil spill response organisations which might offer a sub-contracted remote sensing capability to their clients. Other private sector groups include the insurers for the shipping industry, who are directly and immediately interested in keeping both the costs of the response and oil spill impact damage as low as possible. The news media is a additional potential user, interested in quality graphical representation of the oil spill, as is true for any disaster event.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography